|Publication number||US7376702 B2|
|Application number||US 10/138,207|
|Publication date||May 20, 2008|
|Filing date||May 2, 2002|
|Priority date||May 2, 2002|
|Also published as||DE60324549D1, EP1504353A2, EP1504353A4, EP1504353B1, US20030208546, WO2003094013A2, WO2003094013A3|
|Publication number||10138207, 138207, US 7376702 B2, US 7376702B2, US-B2-7376702, US7376702 B2, US7376702B2|
|Inventors||Christopher Joseph DeSalvo, Scott Kister|
|Original Assignee||Danger, Inc.|
|Export Citation||BiBTeX, EndNote, RefMan|
|Patent Citations (28), Non-Patent Citations (4), Referenced by (19), Classifications (26), Legal Events (7)|
|External Links: USPTO, USPTO Assignment, Espacenet|
1. Field of the Invention
This invention relates generally to the field of data processing systems. More particularly, the invention relates to an improved system and method for processing message attachments between a data service and a data processing device.
2. Description of the Related Art
E-mail has become an irreplaceable tool in today's business environment. Virtually all corporate employees rely on e-mail in one way or another to communicate both externally with customers and internally with other employees.
Current e-mail standards allow files to be “attached” and transmitted along with e-mail messages. The most common file attachment standard is the Multipurpose Internet Mail Extensions (“MIME”) standard, which encodes files on the transmitting end (e.g., using binary-to-ASCII encoding) and subsequently decodes the files on the receiving end. A header is added to the files which includes an indication of the type of data contained in the files and the encoding method used. Secure MIME (“S/MIME”) is a version of MIME that adds Rivest-Shamir-Adleman (“RSA”) encryption for secure transmission.
If the client receiving the e-mail message has the proper software installed, once the attachments are decoded, they may be viewed, executed and/or edited by the message recipient. One problem which exists, however, is that not all clients are equipped with the software required to process all types of message attachments. For example, if an attachment is compressed using a particular compression tool (e.g., such as Winzip™), the message recipient will not be able to open the attachment unless he/she has the compression tool installed on his/her client computer. Similarly, if the attachment is in a particular document format (e.g., Adobe's Portable Document Format), the recipient will not be able to view or edit the attachment unless support for that format is installed on his/her client computer.
Attachments are particularly problematic for wireless and/or portable data processing devices which, quite frequently, do not support standard file formats and executables. Thus, while many wireless/portable devices are capable of connecting to the Internet to download e-mail messages, the message attachments may be unusable.
Accordingly, what is needed is an improved system and method for intelligently processing e-mail message attachments. What is also needed is a system and method which will work without the need for additional software on the receiving client computer or wireless/portable data processing device.
A method is described comprising: receiving an e-mail containing an original attachment at a data service, the e-mail addressed to a data processing device to which the data service is communicatively coupled, the data processing device having specified processing capabilities; converting the original attachment based on the specified processing capabilities to a format which the data processing device can process; receiving an e-mail response from the data processing device intended to include the original attachment; locating and reattaching the original attachment; and transmitting the e-mail message with the original attachment to its destination.
A better understanding of the present invention can be obtained from the following detailed description in conjunction with the following drawings, in which:
Described below is a system and method for coordinating between a plurality of e-mail accounts. Throughout the description, for the purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the present invention. It will be apparent, however, to one skilled in the art that the present invention may be practiced without some of these specific details. In other instances, well-known structures and devices are shown in block diagram form to avoid obscuring the underlying principles of the present invention.
Embodiments of the invention may be implemented on a data processing service 100 such as that illustrated generally in
In one embodiment, the service 100 converts standard applications and data into a format which each wireless data processing device 110 can properly interpret. Thus, as illustrated in
For example, the conversion module 120 may include a hypertext markup language (“HTML”) rendering module (not shown) for interpreting HTML code and downloading any embedded content in the HTML code (e.g., graphics, video, sound, . . . etc) to the service 100. The conversion module 120 may then combine the HTML code and embedded content and generate a set of bytecodes for accurately reproducing the requested content on the data processing device 110. As described above, in one embodiment, the bytecodes may be Java bytecodes/applets. However, the conversion module 120 may generate various other types of interpreted and/or non-interpreted code, depending on the particular type of data processing device 110 being used (e.g., one with an interpreter module or one without).
Because one embodiment of the service 100 maintains an intimate knowledge of the capabilities/configuration of each data processing device 110 (e.g., screen size, graphics/audio capabilities, available memory, processing power, user preferences, . . . etc) it can reconstruct the requested Internet content accurately, while at the same time minimizing the bandwidth required to transmit the content to the device 110. For example, the conversion module 120 may perform pre-scaling and color depth adjustments to the requested content so that it will be rendered properly within the data processing device's 110's display. In making these calculations, the conversion may factor in the memory and processing power available on the data processing device 110. In addition, the conversion module 120 may compress the requested content using a variety of compression techniques, and thereby preserve network bandwidth.
In one embodiment, the conversion module 120 will simply discard Internet content which either cannot be reproduced on the data processing device 110, or which the user has indicated that he/she does not want to be reproduced on the portal device. For example, a user may indicate that he/she does not want sounds to be generated on the data processing device 110 or that he/she does not want advertisements transmitted to the data processing device 110. The conversion module 120 will then remove any sounds or advertisements embedded in the requested Web page (or other requested Internet content). Because HTML rendering and other advanced processing of Internet content/data is offloaded to the service 100 as described above, the data processing device 110 can be manufactured using a low power microprocessor or microcontroller, thereby lowering the cost of manufacture and/or the energy consumed by the device 110.
In one embodiment, when a particular Web page or other Internet object has been converted into a format suitable for execution on the data processing device 110 the formatted page/object may be stored locally on a cache 125 maintained at the service 100. The next time the content is requested, the conversion module 120 may simply read the previously-generated code from the local cache 125 (i.e., it will no longer need to retrieve the content from remote locations to reconstruct the code).
Various caching techniques and algorithms may be implemented to ensure that the cache 125 is storing Internet data efficiently (i.e., resulting in an acceptable percentage of cache ‘hits’) and that the data is current. For example, the service 100 may cache the most frequently-requested Internet data (e.g., the Yahoo™ home page), and may remove content from the cache based on a least-recently used caching policy. In addition, to ensure that data stored in the cache is current, the service 100 may compare the version of the data stored in the cache 125 with the version of data stored at the remote Internet site 130 when the data is requested. Similarly, the service 100 may store data in the cache 125 for some predetermined period of time before checking the remote server 130 for a new version. Various other Internet caching techniques may be employed while still complying with the underlying principles of the invention (e.g., those defined in the Internet Caching Protocol (“ICP”) and/or the Cache Array Routing Protocol (“CARP”)).
One embodiment of the service 100, illustrated in
In one embodiment, the attachment processing techniques described herein may be applied to both internal e-mail accounts 220 (i.e., internal in the sense that they are maintained by the service 100) and external e-mail accounts 230 (e.g., accounts provided by Internet Service Providers or Web portals such as Yahoo™). In addition, while embodiments of the invention are described herein with respect to a wireless device 110 communicating over a wireless network 210, it should be noted that many of these embodiments may be employed for a non-wireless client 215 communicating over a standard, wired network.
If the message does not contain an attachment then, at 310, the service transmits the message to the wireless device 110. Prior to transmission, the service 100 may also convert the e-mail message so that the message may be properly rendered by the wireless device 110. For example, if the e-mail message body is in an HTML format, and the wireless device 110 cannot interpret HTML, the service 100 will convert the HTML content into a format which is interpretable by the device (e.g., as described above with respect to
If the e-mail message contains an attachment then, at 315, the attachment analysis module 242 attempts to determine the attachment type. Virtually any type of file may be attached to an e-mail message including, by way of example but not limitation, a file compressed or otherwise encoded/encrypted (hereinafter “encoded”) using a specified encoding algorithm (e.g., Winzip); a file formatted according to a particular word processing program (e.g., Microsoft Word); and an encoded and/or compressed image (e.g., a JPEG image) which may only be properly displayed using a particular minimum color depth and resolution. In one embodiment, the attachment analysis module will identify the attachment type directly from the attachment header. Sometimes, however, the attachment may not be identified in the header. Rather, it may be delivered as a stream of bytes (an octet stream) with no indication of file type. In this case, the attachment analysis module 242 may perform a more in-depth analysis on the file. For example, in one embodiment, the attachment analysis module 242 may use portions of the file name such as the filename extension (e.g., “.doc” for Microsoft Word documents; “.jpg” for JPEG images, . . . etc) to attempt to identify the file type. In addition, in one embodiment, the attachment analysis module 242 examines the underlying data in the attachment for well known headers. For example, GIF images always start with “GIF87” or “GIF89a.” Similarly, JPEG images start with the bytes “FF D8.”
The attachment analysis module 242 may also query the user as to the file type (e.g., asking the user to link the file to a particular type of application). Various other attachment identification techniques may be employed while still complying with the underlying principles of the invention.
Once the attachment file type is identified, at 320, the attachment conversion module 241 checks to see if a known mechanism exists (e.g., rules, instructions, program code, . . . etc) for converting this type of attachment into a format which the wireless device 110 can process. If it does, it converts the attachment and, at 325, transmits the converted version of the attachment along with the e-mail message to the wireless device 110.
If the attachment conversion module 241 cannot identify the attachment or a conversion mechanism for the attachment, in one embodiment, it may simply refrain from transmitting the attachment to the wireless device 110. It may, however, notify the user that the original message contained an attachment and may include the attachment name within the e-mail message. The attachment conversion module 241 may subsequently transmit the unprocessed attachment to the wireless device in response to a request from the user. The user may then manually attempt to access/process the attachment.
Various types of conversion may be employed by the attachment conversion module 241. For example, if the attachment is a JPEG image, the conversion module 241 may shrink the JPEG image to fit on the wireless device's screen and/or may change the color depth of the image (e.g., it may convert the image to grayscale). Similarly, if the attachment is a Word file, the conversion module 241 may convert the content of the Word file into to a format viewable on the wireless device's screen. If the attachment is a compressed and/or encoded file (e.g., compressed/encoded using Winzip) the conversion module 241 may initially decompress/decode the file to extract the files embedded within the compressed/encoded file. If it can identify the embedded files it may then convert the embedded files as described above, before transmitting the embedded files to the wireless device 110.
A virtually unlimited number of file types may be converted by the attachment processing module 240 for rendering on the wireless device 110 including, but not limited to, Portable Network Graphics (“PNG”) files, Graphics Interchange Format (“GIF”) files, Portable Document Format (“PDF”) files, Hypertext Markup Language (“HTML”) files with different levels of embedded content. Moreover, various additional encoding types may be processed (i.e., decoded and/or re-encoded) including, but not limited to, uuencoding, base64 encoding, and binhex encoding.
Once the e-mail message is received by the wireless device 110, the user may subsequently respond to the e-mail message while still retaining the email message history, including the attachment. In addition, the user may forward the e-mail to another user with the attachment. The user may also detach the attachment file and subsequently re-attach the attachment file to a new e-mail message addressed to another user. In each of these cases, one embodiment of the attachment processing module 240 will transmit the attachment in its original form to the destination address, rather than in its converted form (i.e., so that the message recipient may process the message attachment). However, in one embodiment, the attachment processing module 240 will initially determine whether the destination address is another wireless device capable of processing the converted attachment (e.g., a device of a user subscribed to the service 100). If so, the attachment processing module 240 will transmit the converted attachment, rather than the original attachment.
In one embodiment, when an e-mail containing an attachment is transmitted from the wireless device, instead of sending the converted attachment over the wireless network, only a reference to the attachment is transmitted (e.g., “include attachment #2”), thereby conserving a considerable amount of bandwidth. The reference is subsequently used by the attachment processing module 240 to locate the original attachment.
The original attachment may be identified and/or regenerated by the attachment processing module 240 in a variety of ways. For example, in one embodiment, the attachment processing module 240 maintains a link between attachments stored in the e-mail databases 220, 230 (i.e., the original attachments) and the converted attachments stored on the wireless device 110. The link may simply be a table containing attachment/message ID codes on the wireless device and corresponding e-mail database attachment/message ID codes. Upon receiving an e-mail from the wireless device 110 with a converted attachment, or with a reference to the attachment, the attachment processing module 240 may perform a lookup in the table using the message's and/or attachment's ID code to identify the corresponding original attachment.
In one embodiment, however, the attachment and/or e-mail message ID code does not change when the attachment is converted and transmitted to the wireless device 110. Accordingly, in this embodiment, no table lookup is required to identify the attachment within the e-mail databases 220, 230.
In another embodiment, the attachment conversion module 241 may regenerate the original attachment from the converted attachment. For example, in the case of a Microsoft Word file or other word processing document, the attachment conversion module 241 may reconstruct the format of the original file using text and other information from the converted file. In one embodiment, data may be embedded within the converted file indicating specifically how the Word file should be regenerated. Similarly, in the case of a compressed/encoded file, the attachment conversion module 241 may recompress/re-encode the embedded files. Various other techniques may be employed to link and/or regenerate converted attachments to standard attachments while still complying with the underlying principles of the invention.
Embodiments of the invention may include various steps as set forth above. The steps may be embodied in machine-executable instructions which cause a general-purpose or special-purpose processor to perform certain steps. Alternatively, these steps may be performed by specific hardware components that contain hardwired logic for performing the steps, or by any combination of programmed computer components and custom hardware components.
Elements of the present invention may also be provided as a machine-readable medium for storing the machine-executable instructions. The machine-readable medium may include, but is not limited to, floppy diskettes, optical disks, CD-ROMs, and magneto-optical disks, ROMs, RAMs, EPROMs, EEPROMs, magnetic or optical cards, or other type of media/machine-readable medium suitable for storing electronic instructions.
Throughout the foregoing description, for the purposes of explanation, numerous specific details were set forth in order to provide a thorough understanding of the invention. It will be apparent, however, to one skilled in the art that the invention may be practiced without some of these specific details. For example, while embodiments of the invention are described above in the context of “attachments,” certain principles of the invention may be employed using a variety of alternate e-mail message data. Accordingly, the scope and spirit of the invention should be judged in terms of the claims which follow.
|Cited Patent||Filing date||Publication date||Applicant||Title|
|US5764899||Dec 19, 1995||Jun 9, 1998||Motorola, Inc.||Method and apparatus for communicating an optimized reply|
|US5781901||Dec 21, 1995||Jul 14, 1998||Intel Corporation||Transmitting electronic mail attachment over a network using a e-mail page|
|US5818447||Jun 6, 1996||Oct 6, 1998||Microsoft Corporation||System and method for in-place editing of an electronic mail message using a separate program|
|US5903723||Dec 21, 1995||May 11, 1999||Intel Corporation||Method and apparatus for transmitting electronic mail attachments with attachment references|
|US5974449||May 9, 1997||Oct 26, 1999||Carmel Connection, Inc.||Apparatus and method for providing multimedia messaging between disparate messaging platforms|
|US6023700||Jun 17, 1997||Feb 8, 2000||Cranberry Properties, Llc||Electronic mail distribution system for integrated electronic communication|
|US6092114||Apr 17, 1998||Jul 18, 2000||Siemens Information And Communication Networks, Inc.||Method and system for determining the location for performing file-format conversions of electronics message attachments|
|US6101320||Aug 1, 1997||Aug 8, 2000||Aurora Communications Exchange Ltd.||Electronic mail communication system and method|
|US6256666 *||Jul 14, 1998||Jul 3, 2001||International Business Machines Corp.||Method and system for remotely managing electronic mail attachments|
|US6275848 *||May 21, 1997||Aug 14, 2001||International Business Machines Corp.||Method and apparatus for automated referencing of electronic information|
|US6360252 *||Aug 31, 2000||Mar 19, 2002||Fusionone, Inc.||Managing the transfer of e-mail attachments to rendering devices other than an original e-mail recipient|
|US6505237 *||Jun 22, 2001||Jan 7, 2003||Siemens Information & Communication Networks, Inc.||Method and system for management of message attachments|
|US6546417 *||Jun 27, 2000||Apr 8, 2003||Intellinet, Inc.||Enhanced electronic mail system including methods and apparatus for identifying mime types and for displaying different icons|
|US6598076||May 2, 2000||Jul 22, 2003||Openshark, Inc.||Method and apparatus for electronically communicating an electronic message having an electronic attachment|
|US6839741||Sep 29, 1998||Jan 4, 2005||Mci, Inc.||Facility for distributing and providing access to electronic mail message attachments|
|US20020016818 *||Jul 6, 2001||Feb 7, 2002||Shekhar Kirani||System and methodology for optimizing delivery of email attachments for disparate devices|
|US20020019851||Jul 26, 2001||Feb 14, 2002||Jordan Pollack||System and method for the electronic mail based management and manipulation of stored files|
|US20020035576||Sep 5, 2001||Mar 21, 2002||Sony Corporation||Information presenting apparatus, information presenting method and information presenting program recording medium|
|US20020051181 *||Apr 26, 2001||May 2, 2002||Takanori Nishimura||Information processing apparatus and method, information processing system and medium|
|US20020059384||Jul 5, 2001||May 16, 2002||Koninklijke Philips Electronics N.V.||Substituting URL for attachment in forwarding electronic content|
|US20020120693 *||Feb 27, 2001||Aug 29, 2002||Rudd Michael L.||E-mail conversion service|
|US20030028647 *||Jul 30, 2002||Feb 6, 2003||Comverse, Ltd.||E-mail protocol optimized for a mobile environment and gateway using same|
|US20030050933 *||Sep 13, 2001||Mar 13, 2003||Desalvo Christopher J.||System and method of distributing a file by email|
|US20030065926||Jul 30, 2002||Apr 3, 2003||Schultz Matthew G.||System and methods for detection of new malicious executables|
|US20030093565 *||Jul 3, 2001||May 15, 2003||Berger Adam L.||System and method for converting an attachment in an e-mail for delivery to a device of limited rendering capability|
|US20030095550 *||Nov 18, 2002||May 22, 2003||Lewis John Ervin||System for handling file attachments|
|US20030126214 *||Jul 29, 2002||Jul 3, 2003||Mike Oliszewski||Document management system|
|WO2002013031A1 *||Aug 3, 2001||Feb 14, 2002||Uniwis Co., Ltd||Apparatus and method for connecting and serving an e-mail using wireless terminal|
|1||Christopher J. Desalvo, "A System and Method of Distributing a File by Email", U.S. Appl. No. 09/952,419, filed Sep. 13, 2001, Notice of Allowance mailed May, 24, 2006. Copy of Notice of Allowance, Examiner's reason for allowance and a copy of the claims as allowed.|
|2||Current claims for Related Case U.S. Appl. No. 09/952,419, filed Sep. 13, 2001; 5 pages.|
|3||Office Action for Related Case U.S. Appl. No. 09/952,419, filed Sep. 13, 2001; 13 pgs.|
|4||Wilson, et al., (2000), From the techies . . . , pp. 1-3; Feb. 2000.|
|Citing Patent||Filing date||Publication date||Applicant||Title|
|US7970881 *||Jun 28, 2011||Microsoft Corporation||Bypassing uploading of data from a wireless device using outbound attachment caching|
|US8019822 *||Sep 13, 2011||Accenture Global Services Limited||Personalized storage accounts in an electronic file delivery system|
|US8086719 *||Dec 27, 2011||Microsoft Corporation||Bypassing uploading of data from a wireless device using outbound attachment caching|
|US8126976 *||Jul 9, 2009||Feb 28, 2012||Research In Motion Limited||Delivery of email messages in multiple parts|
|US8281398||Jan 6, 2009||Oct 2, 2012||Microsoft Corporation||Reordering document content to avoid exploits|
|US8341177 *||Dec 25, 2012||Symantec Operating Corporation||Automated dereferencing of electronic communications for archival|
|US9418356||May 7, 2010||Aug 16, 2016||Microsoft Technology Licensing, Llc||Streamlined collaboration on document|
|US20050102376 *||Sep 25, 2003||May 12, 2005||Koji Ichikawa||Image-correction processing apparatus and program|
|US20060031309 *||May 20, 2004||Feb 9, 2006||International Business Machines Corporation||Electronic mail attachment management system and method|
|US20060085508 *||Jan 18, 2005||Apr 20, 2006||Fujitsu Limited||E-mail communication apparatus, attached-file updating apparatus, E-mail communication method, attached-file updating method, and E-mail communication program|
|US20070100946 *||Nov 1, 2005||May 3, 2007||International Business Machines Corporation||Method and apparatus for facilitating generation of electronic mail|
|US20070180035 *||May 1, 2006||Aug 2, 2007||Lucent Technologies Inc.||E-mail attachment selectable download|
|US20090210502 *||Feb 19, 2008||Aug 20, 2009||Danger, Inc.||System and method for bypassing uploading of data from a wireless device using outbound attachment caching|
|US20100011075 *||Jan 14, 2010||Research In Motion Limited||Delivery of email messages in multiple parts|
|US20100011077 *||Jan 14, 2010||Research In Motion Limited||Delivery of email messages with repetitive attachments|
|US20100082760 *||Apr 1, 2010||Accenture S.P.A.||Personalized storage accounts in an electronic file delivery system|
|US20100175133 *||Jul 8, 2010||Microsoft Corporation||Reordering document content to avoid exploits|
|US20110145859 *||Dec 15, 2009||Jun 16, 2011||At&T Intellectual Property I, L.P.||System and method for detachable media devices and content|
|US20110213853 *||Sep 1, 2011||Microsoft Corporation||Bypassing uploading of data from a wireless device using outbound attachment caching|
|U.S. Classification||709/206, 370/392, 707/999.102|
|International Classification||G06F13/00, H04L12/58, G06F15/16, H04L29/06, H04L29/08|
|Cooperative Classification||Y10S707/99943, H04L67/2823, H04L67/2842, H04L69/329, H04L67/303, H04L51/063, H04L29/06, H04L51/066, H04L12/5895, H04L12/5835, H04L12/583|
|European Classification||H04L51/06B, H04L51/06A, H04L12/58C1, H04L29/06, H04L29/08N29T, H04L12/58C2, H04L29/08N27F|
|May 2, 2002||AS||Assignment|
Owner name: DANGER RESEARCH, CALIFORNIA
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:DESALVO, CHRISTOPHER JOSEPH;KISTER, SCOTT;REEL/FRAME:012868/0144;SIGNING DATES FROM 20020423 TO 20020429
|Mar 23, 2007||AS||Assignment|
Owner name: DANGER, INC., CALIFORNIA
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:CALAMERA, PABLO;REEL/FRAME:019095/0809
Effective date: 20070127
|Feb 8, 2008||AS||Assignment|
Owner name: DANGER, INC., CALIFORNIA
Free format text: CHANGE OF NAME;ASSIGNOR:DANGER RESEARCH;REEL/FRAME:020486/0096
Effective date: 20010521
|Sep 20, 2011||FPAY||Fee payment|
Year of fee payment: 4
|Oct 10, 2011||AS||Assignment|
Owner name: MICROSOFT CORPORATION, WASHINGTON
Free format text: MERGER;ASSIGNOR:DANGER, INC.;REEL/FRAME:027039/0009
Effective date: 20110106
|Dec 9, 2014||AS||Assignment|
Owner name: MICROSOFT TECHNOLOGY LICENSING, LLC, WASHINGTON
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MICROSOFT CORPORATION;REEL/FRAME:034541/0477
Effective date: 20141014
|Nov 4, 2015||FPAY||Fee payment|
Year of fee payment: 8